Home
last modified time | relevance | path

Searched refs:digests (Results 1 – 21 of 21) sorted by relevance

/linux/tools/perf/tests/
H A Dutil.c27 u8 *digests; in test_sha1() local
39 digests = malloc(digests_size); in test_sha1()
40 TEST_ASSERT_VAL("failed to allocate digests", digests != NULL); in test_sha1()
48 sha1(data, i, &digests[i * SHA1_DIGEST_SIZE]); in test_sha1()
51 sha1(digests, digests_size, digest_of_digests); in test_sha1()
53 free(digests); in test_sha1()
/linux/security/integrity/ima/
H A Dima_template.c361 struct tpm_digest *digests; in ima_restore_template_data() local
370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data()
371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data()
372 if (!digests) { in ima_restore_template_data()
377 (*entry)->digests = digests; in ima_restore_template_data()
384 kfree((*entry)->digests); in ima_restore_template_data()
H A Dima_crypto.c617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm()
632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash()
640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash()
645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash()
646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
H A Dima_fs.c163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show()
255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
H A Dima.h49 /* bitset of digests algorithms allowed in the setxattr hook */
108 struct tpm_digest *digests; member
H A DKconfig72 template permits both larger hash digests and longer
/linux/drivers/char/tpm/
H A Dtpm-interface.c373 struct tpm_digest *digests) in tpm_pcr_extend() argument
386 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend()
393 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend()
397 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
H A Dtpm2-cmd.c185 struct tpm_digest *digests) in tpm2_pcr_extend() argument
219 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend()
220 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
H A Dtpm.h293 struct tpm_digest *digests);
/linux/net/sunrpc/
H A DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
58 that utilize Camellia ciphers (RFC 3713) and CMAC digests
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
/linux/Documentation/scsi/
H A Dcxgb3i.rst33 from the host driver, computes and inserts the digests, decomposes
40 the digests, then forwarding the header to the host. The payload data,
/linux/include/linux/
H A Dtpm.h476 struct tpm_digest *digests);
503 struct tpm_digest *digests) in tpm_pcr_extend() argument
/linux/Documentation/crypto/
H A Dsha3.rst41 The following functions compute SHA-3 digests::
H A Duserspace-if.rst115 The salg_type value "hash" applies to message digests and keyed message
116 digests. Though, a keyed message digest is referenced by the appropriate
378 - the hash cipher type (keyed message digests)
/linux/Documentation/ABI/testing/
H A Dima_policy166 Example of a 'measure' rule requiring fs-verity's digests
/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst24 The salt is appended when hashing, digests are stored continuously and
/linux/Documentation/filesystems/
H A Dfsverity.rst84 file digests as an alternative to its traditional full file digests.
386 compute fs-verity file digests itself, e.g. in order to sign files.
/linux/crypto/
H A DKconfig879 menu "Hashes, digests, and MACs"
888 BLAKE2b is optimized for 64-bit platforms and can produce digests
/linux/drivers/md/
H A DKconfig558 You'll need to activate the digests you're going to use in the
/linux/drivers/crypto/
H A DKconfig201 Select this option if you want to use the phmac digests
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst689 enabled files, identified via their fsverity digests.